Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
d047e128a3ae4e66bf17ac1115361395_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d047e128a3ae4e66bf17ac1115361395_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d047e128a3ae4e66bf17ac1115361395_JaffaCakes118.html
-
Size
10KB
-
MD5
d047e128a3ae4e66bf17ac1115361395
-
SHA1
6f20933c03e47811f428d5c9ff1b6febfa41e48d
-
SHA256
a39713ee88a5a0ebf5ed1d880f0a74194789e50367dbae3f301edb3b59d89cb5
-
SHA512
5f47b69bcfaf33bab06fd947c104e65b3b663478920f02bec7bf0d7b41d4ee67113a8eb0e1ef122f9e12784554d155237298a8c8c5c89fa16752e406ce8deaeb
-
SSDEEP
96:uzVs+ux7wILLY1k9o84d12ef7CSTUOzfAIl+aG+bzbKOZlCc6ueFV86ChbBh/Ia7:csz7wIAYS//+7+X0zPcnQb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431812062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cbbb6610adf7d2417f4a12166ea8e299e4cad707fea8b266d20b10ce99c4f311000000000e8000000002000020000000ca04fee414ce89b1020efb85838fb25dc7492a5deeb7802b202300b4fc72a17720000000f08234277763cba006380abfe586badd7abdc22dac2de9017470284dc9432d5440000000debd484fc78d138f04a12d703a8fba5469d4ff002f351286edafd78f7cbc44b6757a2fa1c6a71df4e331326b0aa860e5719cc5b2d513531de6e023dcec66cb29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00aa465a9100db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84DAA051-6C84-11EF-87F4-7694D31B45CA} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2840 2704 iexplore.exe 30 PID 2704 wrote to memory of 2840 2704 iexplore.exe 30 PID 2704 wrote to memory of 2840 2704 iexplore.exe 30 PID 2704 wrote to memory of 2840 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d047e128a3ae4e66bf17ac1115361395_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e476b5bdf17522a5100d2f19b0e4d59
SHA136f1b4d54f6d0125d94b1601b4c5bdcb634b0fde
SHA256caaef638ac2d0f364d807312dc7801856b274a9dfc855c72372542a97feb28ba
SHA512dabfd1fbd817b1fab86dd1ea96270665a1e552c930bbb4ac19e28df9486f27b883d566a2c36fa1562ebcdd82ca3320c291570e383799e52f3f2019a3d4f28ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384fd5f1b5c35b34db53f120ae116483
SHA1465026f6c819edbe7332980d4e7539b8916979f6
SHA2565d52fb45ed32389a94dd2b04c9fac96ccff7e962228a2bd5d95a01a3aeee234c
SHA512e54933fb5a542340f87673476615d0ddacf588685e2da2ba692f972eaeeffceff353bbb80c0b0558312a9824b32d6bdc0345bb002d9c343f038110ee8ec98d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158d70c9fdde06b5c186046d5e6a2507
SHA103e41e7ed690aa88f7350d17d1caaf88b3b3a483
SHA256a78714da87478a521e9501b4ecb39ebba8adf8f4c2cca860b5c4cd3907635b4b
SHA512c1db172ef37046a3def241550d1f0e8c187c401661350056a6ac3b683c3b0989862f41edb763180168ffdf83167e012f3a0da16c36fbdba29ebf704d1d645856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2827cf427c447db0dacdb871b118027
SHA185698549e8580b3189654527cc0861129aaf85bc
SHA256395633aeece74c2b04f716578a921a4f4c9a5cb1d8075b3dd8ed429bec23e95d
SHA512235fd5bc139f1c2685fc8399b760e2b5310304f39421e0845d2c7570e1d649f244a812669f9f70480bebeef164bfe0a64fa67184e0334271d3f406145b683536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e064f61495c6f50c86b76dbd9bdc6b0
SHA1f5ed5c41fd1fb878e337c73ba3242d7646ece6ba
SHA25615d4827e2be8cfc7c73f93a0000cd6331541889b9322df1074ed62d55fd6ff6b
SHA51271440214ae5f20fedb5b84b672d0305112c666d6d7856ecd6c805bdfaedbc7179a2ff082fccd3ab2ccbc7d4fadd618b20a4bd2ade0df1e705587b5f50949a0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384e8c925ba5b721cfe65f71bda9f797
SHA198823e76e20c1d072d15171a0ffce22594abf0d6
SHA25606be02d8b45ecdecce8c80c975df2437292976f7fe3d06e2b03531822cc40c6a
SHA512e057a3e68198bbfd295bfd5b08371ffa1fc28505040a721d5e9f7a730ef9714f7bf9a276b20b13fafee634435710df5daf3dd946e47ea72cf06b32138c50bcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170e67226172af500c4fbce2b980c69e
SHA149f25520530b4700f2f75b4c37b4e073faf98f9e
SHA256c7ce1871c8170fcf57ebb90cd0abd89e47fd210b81f0fca69c7e692a9859c303
SHA512badd208e7d8c883e59eed26f5ee8fca9e73c6da9ceb2e07ae637b1bd9cf6466b926767b15f31fec715192e5038f613b2fd9f0191a8728be55e2a669863ecd043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736a8fc29066ed20e52a883ab436278b
SHA1678187b4c22bc5e7804187e0c678687c6474cc50
SHA2562d4e4089a9ef1cce90ae5d44bbbf655dc056b6d9fd60f82288213916b7ed3b75
SHA5122f88a013b64366091ab77001e3a9d6f8de1706d43b73b3b78f514d4a17a2b58bab1b89dafe87de73c016eeee0009ab17700805810b244ee1ac2d88c03df66da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92753a94c774a7aac444ac517680e08
SHA1f42db4ed104c63460013e4affaab99443149573e
SHA25633c072615d2f2107abe0ddf043349eedb3199cfa112ded034952e998eb159d99
SHA51281902ea243c68244de8d387c7c6478789f092d0af24dabc33b2e542ec82dddb1c5e5dc17e93bb8fc640875c2e3838e9fe68b914dec4a58c13813cd36b0e7a676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bae63ab8ea19b1fb7783ed60a9a6782
SHA14174b8d4abfe034e7c8633d7b7f690f5b89c5d80
SHA256c94f98064eb5eb65d4dddc70e10b762116c1104fbe082f04e6be078781070329
SHA512c789203efa60bca60f1ea87acb6ed5f09c381c204d6bf525db4be9d390a956eb7e0b47c8188ddc41f8593b6a77717f88c30075c880c0264958823e00d6bd9684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d52abdf95fb2401539ca4c9a9b55aa52
SHA1fb210c65ebf0d9112aa44a8dbfc518fb6ead801a
SHA2567b56f65063ac07b385099b4822130eaf6638966771f19bca4c4c07ba55b5e875
SHA5125f0d0ac357f8a87d8d387950cdf4962c268e8bcaa529762283454335f78b87a021508421948e36d99c75daebeda80594486d79affaea84480ce04c18daad27b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2369f984c56d0e091e4fca9aed0c28
SHA1259e3c6556de1bde53ece62344a398a77e235fb3
SHA256203554b161d9815c8fee1e28595e931592b3ef4ef0502279aac00d2b0fbdf7e9
SHA512b8cc1a5f178c87e6b79389498b6608af6ed27998c69944e8290d5465c51ff24745a43ff3d516912aa799a89acc50e0249dbddbef8cb0da1d630a371c3ae3c8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f524019390b8db5bbe5c19b50b5e845
SHA18e2302c72ac7d7740bf5405762ce874b4612ad17
SHA256beeccc98642b282148ea3a62fcdc5f82349bba3a4935901652f483e6da425f00
SHA512dc988faf2189794ca2ba7ff8a676df723e033f5eab63cc10a0c036f92c271a1d0cd94250d52ecaffd9f333ee15614124dc66b6ee317402263721183676ba78d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544bb1cc55c55ba9b6defb9b3c70e71f0
SHA1451b95b3de765233659a16759ddeeeec6beda079
SHA256d544a3e2ee22b1aa0db105c41fd3739f0a6c9effae42f343e4432aaa3730db46
SHA512b5034867afb6cc9376739261998a1b5afd10c836e284b701c0ac7fcd16012a7d4786464daa8db0fd32abb43b0d043432c884719acfc09bb4b554e751da010891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a7ec4570d24a0d8381b266f5fa765f
SHA1d82141620f60fdaee2f0ac82856fcdc5f1a4212b
SHA256ae8a82d8496d7e9bc5685300297bd60cc43bd9945443d2c9e7d12a5909c34a29
SHA5124f7d998932c3243383cb5ad78340c1bc243bd056ce81a0b4a11b568e8866a85ec4f70d95ca28537de2b77441ee3709093c0982b6a2b30fd4505ac014aac82fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616c9aa107b59ecb7e60c77485af4d95
SHA1c709ff685bc50ac835a23427e38c6483f9011265
SHA2568a44f45f6f620e10a1d97807b61a8cef29a38c36dd9ce1236251116589565a72
SHA512fe94c17f4980b2d7528a1e76345605a5d1ca547b83d400913fac1bdba60881353b1021eecbd05947e0aa3e8a1222169422826ec9cfaf9f4290eb921a168396b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f609a81db11fe6ff59d1eac587542b
SHA18948d2c7390f9e827c297deb2c0b1e676e1312ba
SHA256ebacb209cf5c139ae75187d2dfbb8205d22f0698d3684b90d559c156e63a010e
SHA512892d00c931ac8132278624845ffba256432e86529aa1b1fdb3b93d28ec404543ebb89c34d37d0960c0e6c3186dc7e327e32ba61231c9ce01676d4f186c9e285c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c8dd3bae3453297ecd3084469841cd
SHA1d8498bf38ee0a591cdce0c8fdc778bf62a760a33
SHA25669ab7c3a36584d23261525d475066ea123c95019d084f96aa4dde94771f572ab
SHA512ccf898a8eb4733e8434e722f857937c9cac183e8f7eecf1c5f2be50794d703033810a96fcb1071538ab6ccbb4ae077ab5dd2b1d83bc02b6833ea75335920e720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56650feaf6db4b2fcf78dba79ddffb066
SHA117928d3414bdb01f6031e69225236cc635a00296
SHA25623bb7b8ef134457d44decc35366568c8a49aec8b7e575f8b1a29e32ad2c926e6
SHA5121d6649bc9243155f9ce00330d11338646dce0ffdbc5b982403ece4a8bb560fb742f72de9781546f830435dc4b80f80f8d78791ad3b2a6ae83075a474672b3ebd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b